Interview: Amanda Stent, head of AI strategy and research, Bloomberg
Amanda Stent was researching natural language processing (NLP) at a time when there were only around 20 people in the world working on it –…
Amanda Stent was researching natural language processing (NLP) at a time when there were only around 20 people in the world working on it –…
A critical remote code execution (RCE) vulnerability, identified as CVE-2025-31324, in SAP NetWeaver Visual Composer 7.x is being actively exploited by a Chinese threat actor,…
Cybercriminals are increasingly targeting IT administrators through sophisticated Search Engine Optimization (SEO) poisoning techniques. By leveraging SEO tactics typically used for legitimate online marketing, attackers…
A clever malware campaign delivering the novel Noodlophile malware is targeting creators and small businesses looking to enhance their productivity with AI tools. But, in…
May 09, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version…
Companies are sitting on a wealth of valuable data that could be used to share relevant information with employees to improve the customer experience. However,…
A recent discovery by the FortiMail Incident Response team has revealed a highly sophisticated email campaign targeting organizations in Spain, Italy, and Portugal. This attack…
Cybercrime Magazine caught up with Dr. Taher Elgamal, Partner at Evolution Equity Partners, at the recent RSA Conference 2025 in San Francisco. The tech industry luminary was the recipient…
May 09, 2025The Hacker NewsArtificial Intelligence / Software Security AI agents are changing the way businesses work. They can answer questions, automate tasks, and create…
The government has plans to increase the number of girls taking maths at A-level in a bid to encourage more girls into careers in artificial…
Cybercriminal services target end-of-life routers, FBI warns Pierluigi Paganini May 09, 2025 The FBI warns that attackers are using end-of-life routers to deploy malware and…
Cybersecurity researchers at Kaspersky have identified a new supply chain vulnerability emerging from the widespread adoption of AI-generated code. As AI assistants increasingly participate in…